beautypg.com

ZyXEL Communications Broadband Security Gateway P-312 User Manual

Page 251

background image

P312 Broadband Security Gateway

DD

Index

Encapsulation

PPP over Ethernet.................................................... E

Ethernet Encapsulation3-8, 4-1, 4-5, 4-6, 4-10, 6-

11, 6-12

Example E-Mail Log ........................................15-6
Examples ........................................................19-1

F

Factory Default................................................2-11
Filename Conventions.....................................10-1
Filter ................................................. 2-12, 4-9, 7-1

About.................................................................... 7-1
Applying............................................................. 7-17
Configuring .......................................................... 7-4
Example.............................................................. 7-14
Filter log............................................................... 9-7
Generic Filter Rule ............................................. 7-12
NAT ................................................................... 7-16
Structure ............................................................... 7-2

Filters

Executing a Filter Rule......................................... 7-2
Logic Flow of an IP Filter .................................. 7-10

Firewall

Address Type.................................................... 16-11
Alerts .................................................................. 15-3
Connection Direction ......................................... 16-3
Creating/Editing Rules ....................................... 16-8
E-Mail ................................................................ 15-3
Guidelines For Enhancing Security.................... 13-9
Logs.................................................................... 15-4
Policies ............................................................... 16-1
Rule Logic.......................................................... 16-1
Rule Precedence ................................................. 16-6
Services .............................................................. 16-4
SMT Log ............................................................ 14-2
SMT Menus........................................................ 14-1
Types .................................................................. 13-1
Vs Filters ............................................................ 14-6
Web Configurator............................................... 15-1
When To Use...................................................... 14-7

Flow Control ......................................................2-4
Front Panel LEDs ..............................................2-1
FTP File Transfer ............................................10-7
FTP Server .............................................. 1-3, 6-17

G

General Setup................................................... 2-8

H

Half-Open Sessions ........................................ 15-8
Hidden Menus................................................... 2-5
Housing............................................................. 2-4
HTTP....................6-13, 13-1, 13-3, 13-4, U, X, AA

I

IANA ..........................................................3-1, 3-2
ICMP echo .............................................13-5, 14-3
idle timeout ....................................................... 4-3
IGMP (Internet Group Multicast Protocol) ......... 3-3
Initial Screen ..................................................... 2-4
Installation Requirements ................................. 2-3
Internet access.................................................. 3-1
Internet Access Setup........ 2-6, 3-8, 3-9, 6-4, 21-2
Internet Assigned Numbers Authority .... See IANA
Internet Control Message Protocol (ICMP)13-5,

14-3

IP address..................................................3-1, 3-6
IP Address Assignment.............................4-6, 4-8
IP Alias Setup ................................................... 3-7
IP Multicast ................................................1-2, 3-3

Internet Group Management Protocol (IGMP) .... 1-2

IP Network Number........................................... 3-1
IP Pool .............................................................. 3-3
IP Ports ........................................................... 13-4
IP Spoofing .............................. 13-4, 13-6, 14-2, Z
IP Static Route ....................................5-1, 5-2, 5-3

J

Java ................................................................ 20-1
Java VM .......................................................... 20-1

K

Key Fields For Configuring Rules ................... 16-2
Keyword .......................................................... 20-2